A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search

Authors

  • Sarkar A Department of Computer Science and Electronics, R.K.M. Vidyamandira, Belur Math, Belur, India
  • Dey J M.U.C Women’s College, B.C. Road, Burdwan, West Bengal,India,
  • Bhowmik A Department of Computer Application, C.R.T.I., Tinkonia, Burdwan, India,
  • Ferdows SS M.U.C Women’s College, B.C. Road, Burdwan, West Bengal,India,

Keywords:

Cuckoo Search, Levy flights, Statistical tests

Abstract

Nature inspired food foraging features by the cuckoo species promotes the proposed methodology to generate a true random session key. To make more complex for the intruders, a key based on the behavior of cuckoo species creates the fittest solution out of the sample population. Metaheuristic based optimization algorithms are good enough to encapsulate information during the wireless communication in more secured approach. Statistical fitness function ensuring with randomized expansion of bits in the session key have been tested. The key which has been generated dynamically using cuckoo search passed through different statistical tests in order to synthesize the randomness. In this paper run test is used for examining the robustness of key and test result shows the good randomness.

References

[1] Younsung Choi, Cryptanalysis on Privacy-Aware Two-Factor Authentication Protocol for Wireless Sensor Networks, Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, Issue 2, pp. 296 – 301, 2017

[2] Xin-She Yang, Suash Deb, Cuckoo Search via Levy Flights, In the Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC 2009), IEEE Publications, USA, pp.210-214, 2009.

[3] T. El-Ghazali, Metaheuristics: From Design to Implementation, vol. , John Wiley & Sons, 

[4] T. El-Ghazali, Metaheuristics: From Design to Implementation, vol. , John Wiley & Sons, 

[5] Gove Nitinkumar Rajendra, Bedi Rajneesh kaur , “A New Approach for Data Encryption Using Genetic Algorithms and Brain Mu Waves”, International Journal Of Scientific And Engineering Research Volume 2, Issue 5, May-2011.

[6] Baumjohann, W., and R. A. Treumann (1997), Basic Space Plasma Physics, Imperial College Press, London.

[7] Abramowitz, M., and I. A. Stegun (1965), Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, Dover.

[8] Iztok Fister Jr., Dusan Fister, Iztok Fister, A comprehensive review of cuckoo search: variants and hybrids, Int. J. Mathematical Modelling and Numerical Optimisation, Vol. 4, Issue. 4, pp.387-409, 2013.

[9] 7.C.Asmuth and J.Bloom, A modular to key safeguarding, IEEE Transaction on Information Theory, vol.29, no. 2, pp. 208-210, 1983.

[10] G.R. Blakley, Safeguarding cryptographic keys,in Proceedings of AFIPS International Worhshop on Managing Requirements Knowledge, pp. 313, 1979.

[11] Whitfield Diffman and Martin Hellman New Directions of cryptography, Bulletin of the American Mathematical Society 42 (2005), 3-38; online in 2004. ISSN 0273-0979.

[12] M. L Wu and T. Y. Hwang, 1984, Access control with single key-lock, IEEE Transaction on Software Engineering, Vol. SE- , No. 2, pp.185-191.

Downloads

Published

2025-11-24

How to Cite

[1]
A. Sarkar, J. Dey, A. Bhowmik, and S. S. Ferdows, “A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 184–187, Nov. 2025.